From 94125e89b6be74cb20100d5321a98aa6529187a9 Mon Sep 17 00:00:00 2001 From: Havoc Pennington Date: Tue, 12 Jun 2007 18:36:19 +0000 Subject: 2007-06-12 Havoc Pennington * dbus/dbus-auth.c (sha1_handle_second_client_response) (handle_server_data_anonymous_mech): add the process ID from socket credentials, if available, even if not using EXTERNAL * dbus/dbus-transport.c (auth_via_default_rules): support allow_anonymous flag * dbus/dbus-connection.c (dbus_connection_get_is_anonymous) (dbus_connection_set_allow_anonymous): new API for controlling anonymous access --- dbus/dbus-auth-script.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'dbus/dbus-auth-script.c') diff --git a/dbus/dbus-auth-script.c b/dbus/dbus-auth-script.c index dd864ca5..eb145e49 100644 --- a/dbus/dbus-auth-script.c +++ b/dbus/dbus-auth-script.c @@ -665,7 +665,7 @@ _dbus_auth_script_run (const DBusString *filename) DBusCredentials *authorized_identity; authorized_identity = _dbus_auth_get_identity (auth); - if (!_dbus_credentials_are_empty (authorized_identity)) + if (!_dbus_credentials_are_anonymous (authorized_identity)) { _dbus_warn ("Expected anonymous login or failed login, but some credentials were authorized\n"); goto out; @@ -677,7 +677,7 @@ _dbus_auth_script_run (const DBusString *filename) DBusCredentials *authorized_identity; authorized_identity = _dbus_auth_get_identity (auth); - if (_dbus_credentials_are_empty (authorized_identity)) + if (_dbus_credentials_are_anonymous (authorized_identity)) { _dbus_warn ("Expected to have some credentials, but we don't\n"); goto out; -- cgit